Splunk Enterprise <9.3.1/9.2.3/9.1.6 REST_Calls DEBUG Sensitive Param Exposure
CVE-2024-45738 Published on October 14, 2024

Sensitive information disclosure in REST_Calls logging channel
In Splunk Enterprise versions below 9.3.1, 9.2.3, and 9.1.6, the software potentially exposes sensitive HTTP parameters to the `_internal` index. This exposure could happen if you configure the Splunk Enterprise `REST_Calls` log channel at the DEBUG logging level.

NVD

Weakness Type

What is an Information Disclosure Vulnerability?

The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information.

CVE-2024-45738 has been classified to as an Information Disclosure vulnerability or weakness.


Products Associated with CVE-2024-45738

Want to know whenever a new CVE is published for Splunk? stack.watch will email you.

 

Affected Versions

Splunk Enterprise:

Exploit Probability

EPSS
0.10%
Percentile
26.96%

EPSS (Exploit Prediction Scoring System) scores estimate the probability that a vulnerability will be exploited in the wild within the next 30 days. The percentile shows you how this score compares to all other vulnerabilities.